Home - Sports - Hashing |
Page 3 41-60 of 74 Back | 1 | 2 | 3 | 4 | Next 20 |
41. Free MD5 Checksum Or Hashing Utilities (Free MD5sum Software) (thefreecountry.co Free programs to compute the MD5 message digest checksum / hash value of a file or group of files, and compare it with a known value. http://www.thefreecountry.com/utilities/free-md5-sum-tools.shtml | |
|
42. Libketama - A Consistent Hashing Algo For Memcache Clients - Amarok Blog This meant that whenever we added or removed servers from the pool, everything hashed to different servers, which effectively wiped the entire cache. http://amarok.kde.org/blog/archives/363-libketama-a-consistent-hashing-algo-for- | |
|
43. PCI Blog - Compliance Demystified » Blog Archive » Secure Hashing Of PAN Requi One of the topics that always comes up (as it has in the forum) is that of how to satisfy the strong oneway hash functions aspect of PCI DSS requirement http://pcianswers.com/2007/12/28/secure-hashing-of-pan-requires-salt/ | |
|
44. Phoenix Hash House Harriers - Hashing The Wrong Way Since 1988 Schedules, contacts, photos, and other information about the Phoenix Hash House Harriers, a drinking club with a running problem in Phoenix, Arizona, http://phoenixhhh.org/ | |
|
45. JBCrypt - Strong Password Hashing For Java jBCrypt is a Java implementation of OpenBSD s Blowfish password hashing code, as described in A FutureAdaptable Password Scheme by Niels Provos and http://www.mindrot.org/projects/jBCrypt/ | |
|
46. CMPH - C Minimal Perfect Hashing Library A perfect hash function maps a static set of n keys into a set of m integer numbers without collisions, where m is greater than or equal to n. http://cmph.sourceforge.net/ | |
|
47. Extendible Hashing Without periodic reorganization, static hashing will produce unacceptable performance as the file grows. During the reorganization, the file must be http://www.isqa.unomaha.edu/haworth/isqa3300/fs009.htm | |
|
48. Halve Mein Hash House Harriers Anyone interested in hashing and would like to try it come on out! Your first run is on the hash (thats right free, gratis, no money, just your time, http://www.hmhhh.com/ |
49. Hawaii Hashing Gateway also includes Hawaii Full Moon Hash House Harriers, Oahu Pick Up Hash House Harriers, Kukini Nui Hash House Harriers, Burnt Rubber Hash House Harriers, http://alohah3.org/ | |
|
50. 10.2 Hmac -- Keyed-Hashing For Message Authentication Note The md5 hash has known weaknesses but remains the default for backwards compatibility. Choose a better one for your application. http://docs.python.org/lib/module-hmac.html | |
|
51. Fuzzy Hashing And Ssdeep Jesse D. Kornblum, Identifying almost identical files using context triggered piecewise hashing , Digital Investigaton, 3(S)9197, September 2006, http://ssdeep.sourceforge.net/ | |
|
52. Image Hashing Research At UT Austin Image hashing Research. Prof. Brian L. Evans UT Austin. Welcome Introduction Methods Contributions Geometric Attacks Software Dissertations http://users.ece.utexas.edu/~bevans/projects/hashing/index.html | |
|
53. Hashing Lecture 21 The basics of hashing is to apply a function to the search key so we can determine where the item is without looking at the other items. http://www.cs.sunysb.edu/~skiena/214/lectures/lect21/lect21.html | |
|
54. Hashing On The Internet a.h.h.h is the original internet hashing newsgroup. Unfortunately, very few computer systems carry it so traffic is low. Questions may go unanswered; http://www.sdsc.edu/~wilkinsn/hashing.internet.html | |
|
55. Hash Function - Wikipedia, The Free Encyclopedia A hash function is any welldefined procedure or mathematical function for turning some kind of data into a relatively small integer, that may serve as an http://en.wikipedia.org/wiki/Hash_function | |
|
56. World Hash House Harriers Home Page World s largest resource for the Hash House Harriers, a social hounds and hare running and bicycling club with groups in every major city in the world. http://www.gthhh.com/ | |
|
57. An Illustrated Guide To Cryptographic Hashes This demonstrates that no matter how big the input stream is, the generated hash is the same size (but of course, not the same value). http://www.unixwiz.net/techtips/iguide-crypto-hashes.html | |
|
58. A Hash Function For Hash Table Lookup I offer you a new hash function for hash table lookup that is faster and more thorough than the one you are using now. I also give you a way to verify that http://burtleburtle.net/bob/hash/doobs.html | |
|
59. This Is The Home Page Of The Atlanta Hash House Harriers And Harriettes This is the Web Site for the Atlanta Hash House Harriers and Harriettes AH4 for Short - We Run and Drink Beer Every Saturday at 130 PM, and Virgins get http://www.atlantahash.com/ | |
|
60. FNV Hash The basis of the FNV hash algorithm was taken from an idea sent as reviewer comments to the IEEE POSIX P1003.2 committee by Glenn Fowler and Phong Vo. http://isthe.com/chongo/tech/comp/fnv/ | |
|
Page 3 41-60 of 74 Back | 1 | 2 | 3 | 4 | Next 20 |